Page 31 - 《软件学报》2024年第6期
P. 31
陈金宝 等: DBI-Go: 动态插桩定位 Go 二进制的非法内存引用 2607
[45] Patil H, Pereira C, Stallcup M, Lueck G, Cownie J. PinPlay: A framework for deterministic replay and reproducible analysis of parallel
programs. In: Proc. of the 8th Annual IEEE/ACM Int’l Symp. on Code Generation and Optimization. Toronto: ACM, 2010. 2–11. [doi:
10.1145/1772954.1772958]
[46] Brumley D, Newsome J, Song D, Wang H, Jha S. Towards automatic generation of vulnerability-based signatures. In: Proc. of the 2006
IEEE Symp. on Security and Privacy. Berkeley: IEEE, 2006. 15–16. [doi: 10.1109/SP.2006.41]
[47] Lin ZQ, Jiang XX, Xu DY, Zhang XY. Automatic protocol format reverse engineering through context-aware monitored execution. In:
Proc. of the 15th Symp. on Network and Distributed System Security. San Diego: NDSS, 2008. 1–15.
[48] Narayanasamy S, Pokam G, Calder B. Bugnet: Continuously recording program execution for deterministic replay debugging. In: Proc. of
the 32nd Int’l Symp. on Computer Architecture. Madison: IEEE, 2005. 284–295. [doi: 10.1109/ISCA.2005.16]
[49] Clarke E, Kroening D, Lerda F. A tool for checking ANSI-C programs. In: Proc. of the 10th Int’l Conf. on Tools and Algorithms for the
Construction and Analysis of Systems. Barcelona: Springer, 2004. 168–176. [doi: 10.1007/978-3-540-24730-2_15]
[50] Sen K, Marinov D, Agha G. CUTE: A concolic unit testing engine for C. ACM SIGSOFT Software Engineering Notes, 2005, 30(5):
263–272. [doi: 10.1145/1095430.1081750]
[51] Cadar C, Ganesh V, Pawlowski PM, Dill DL, Engler DR. EXE: Automatically generating inputs of death. ACM Trans. on Information
and System Security, 2008, 12(2): 10. [doi: 10.1145/1455518.1455522]
[52] Cadar C, Dunbar D, Engler DR. KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs. In:
杰出会员, 主
Proc. of the 8th USENIX Conf. on Operating Systems Design and Implementation. San Diego: USENIX Association, 2008. 209–224.
[doi: 10.5555/1855741.1855756]
[53] Go. Go 1.18 release notes. 2022. https://tip.golang.org/doc/go1.18#go-command
[54] Stepanov E, Serebryany K. MemorySanitizer: Fast detector of uninitialized memory use in C++. In: Proc. of the 2015 IEEE/ACM Int’l
Symp. on Code Generation and Optimization. San Francisco: IEEE, 2015. 46–55. [doi: 10.1109/CGO.2015.7054186]
[55] Serebryany K, Iskhodzhanov T. ThreadSanitizer: Data race detection in practice. In: Proc. of the 2009 Workshop on Binary Instrumentation
and Applications. New York: ACM, 2009. 62–71. [doi: 10.1145/1791194.1791203]
[56] Duck GJ, Yap RHC. EffectiveSan: Type and memory error detection using dynamically typed C/C++. ACM SIGPLAN Notices, 2018,
53(4): 181–195. [doi: 10.1145/3296979.3192388]
[57] Berger ED, Zorn BG. DieHard: Probabilistic memory safety for unsafe languages. ACM SIGPLAN Notices, 2006, 41(6): 158–168. [doi:
10.1145/1133255.1134000]
[58] Nagarakatte S, Zhao JZ, Martin MMK, Zdancewic S. SoftBound: Highly compatible and complete spatial memory safety for C. ACM
SIGPLAN Notices, 2009, 44(6): 245–258. [doi: 10.1145/1543135.1542504]
[59] Wang Y, Qiao L, Xu C, Liu YP, Cheung SC, Meng N, Yu H, Zhu ZL. Hero: On the chaos when PATH meets modules. In: Proc. of the
43rd IEEE/ACM Int’l Conf. on Software Engineering. Madrid: IEEE, 2021. 99–111. [doi: 10.1109/ICSE43902.2021.00022]
[60] Li WQ, Jia SJ, Liu LM, Zheng FY, Ma Y, Lin JQ. CryptoGo: Automatic detection of Go cryptographic API misuses. In: Proc. of the 38th
Annual Computer Security Applications Conf. Austin: ACM, 2022. 318–331. [doi: 10.1145/3564625.3567989]
[61] Vyukov D. Go escape analysis flaws. 2015. https://docs.google.com/document/d/1CxgUBPlx9iJzkz9JWkb6tIpTe5q32QDmz8l0BouG0Cw
陈金宝(1999-), 男, 硕士生, 主要研究领域为现 李清伟(2001-), 男, 硕士生, 主要研究领域为程
代语言编译和运行时系统, 软件安全. 序语言运行时, 程序分析.
张昱(1972-), 女, 博士, 教授, CCF 丁伯尧(1999-), 男, 博士生, CCF 学生会员, 主
要研究领域为面向新兴计算的编程系统, 软件分 要研究领域为面向内存安全的程序分析, 多语言
析与系统优化, 智能计算, 数据计算, 量子计算. 程序交互与适配, 现代语言编译和运行时系统.